[go: up one dir, main page]

Hilton et al., 2022 - Google Patents

Beware of ips in sheep's clothing: Measurement and disclosure of ip spoofing vulnerabilities

Hilton et al., 2022

View PDF
Document ID
13419278370548909864
Author
Hilton A
Hirschmann J
Deccio C
Publication year
Publication venue
IEEE/ACM Transactions on Networking

External Links

Snippet

Networks not employing destination-side source address validation (DSAV) expose themselves to a class of pernicious attacks which could be prevented by filtering inbound traffic purporting to originate from within the network. In this work, we survey the …
Continue reading at scholarsarchive.byu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Li et al. You've got vulnerability: Exploring effective vulnerability notifications
Dagon et al. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
US8869237B2 (en) Method and system for propagating network policy
Vissers et al. The wolf of name street: Hijacking domains through their nameservers
USRE50068E1 (en) Method and system for propagating network policy
Alowaisheq et al. Zombie awakening: Stealthy hijacking of active domains through DNS hosting referral
Deccio et al. Behind closed doors: a network tale of spoofing, intrusion, and false DNS security
Bou-Harb et al. Multidimensional investigation of source port 0 probing
Dissanayake DNS cache poisoning: A review on its technique and countermeasures
Schwittmann et al. Domain impersonation is feasible: A study of ca domain validation vulnerabilities
Hilton et al. Beware of ips in sheep’s clothing: Measurement and disclosure of ip spoofing vulnerabilities
Schlamp et al. A forensic case study on as hijacking: the attacker's perspective
Hudaib et al. DNS advanced attacks and analysis
Noborio et al. A feasible motion-planning algorithm for a mobile robot based on a quadtree representation
Li et al. The maginot line: Attacking the boundary of {DNS} caching protection
Shulman et al. Towards forensic analysis of attacks with DNSSEC
Akiwate et al. Retroactive identification of targeted DNS infrastructure hijacking
Nosyk et al. Unveiling the weak links: exploring DNS infrastructure vulnerabilities and fortifying defenses
Schechter et al. Inoculating SSH Against Address Harvesting.
Bator et al. Security of the DNSSEC protocol and its impact on online privacy protection
AT&T Microsoft Word - karasaridis_DNS_Security_E1.0_20120425
Aucklah et al. The impact of internet of things on the domain name system
Reed et al. Potential Email Compromise via Dangling DNS MX
Chowdhury et al. eyedns: Monitoring a university campus network
Nosyk et al. Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet